
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap buffer overflow vulnerability was discovered in fdkaac before version 1.0.5, specifically in the cafinfo function within cafreader.c. The vulnerability was reported on February 15, 2023, and affects the core functionality of the software when processing certain input files (GitHub Issue).
The vulnerability manifests as a heap-based buffer overflow during the execution of the cafinfo function in cafreader.c at line 116. The issue occurs during a READ operation of size 27 bytes, where the program attempts to access memory beyond the allocated buffer region. The affected memory region is a 132,864-byte allocation, and the overflow occurs at the rightmost boundary of this region. The vulnerability was identified using AddressSanitizer (ASAN) instrumentation (GitHub Issue).
When exploited, this vulnerability could lead to memory corruption, potentially causing program crashes or undefined behavior. The heap buffer overflow could potentially be leveraged for arbitrary code execution, though this has not been explicitly demonstrated (GitHub Issue).
The vulnerability has been fixed in fdkaac version 1.0.5. Users are advised to upgrade to this version or later to mitigate the risk. For those unable to upgrade immediately, there are no documented workarounds (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."